A Critical Security Alert: Protect Your Company Data from Hackers
A recent advisory from the National Computer Emergency Response Team (National CERT) has issued a critical warning to organizations worldwide. The alert highlights a severe remote code execution vulnerability in the open-source workflow automation platform, n8n.
This vulnerability, tracked as CVE-2026-21858, carries a maximum CVSS score of 10.0, indicating its potential for widespread damage. It allows unauthenticated attackers to execute arbitrary commands, granting them full control over affected systems remotely.
The issue stems from improper input validation and inadequate authorization checks in the exposed components of the n8n platform. What makes this vulnerability particularly dangerous is that exploitation does not require authentication or user interaction, making it incredibly easy for attackers to execute their malicious plans.
The consequences of a successful attack are dire. Attackers could execute remote code, take over servers, manipulate or delete workflows, steal stored credentials (including API keys and tokens), and exfiltrate sensitive business data. Moreover, compromised workflows could be used for lateral movement, creating broader supply chain risks for partners and downstream services.
This advisory comes on the heels of a series of critical n8n vulnerabilities reported over the past two weeks, including CVE-2025-60613, CVE-2025-68613, and CVE-2026-21877, indicating sustained attacker interest in the platform. Versions prior to 1.121.0 are confirmed vulnerable, while some configurations up to version 1.121.3 may remain at risk if not properly secured.
Organizations are urged to treat this issue as an emergency. They should immediately upgrade to n8n version 1.121.0 or later, with 1.121.3 recommended where applicable. Additional measures include rotating all credentials and secrets, reviewing audit logs for unauthorized activity, restricting network access to exposed instances, and implementing continuous monitoring and hardening practices to reduce the risk of exploitation.
Don't leave your company data vulnerable. Take action now to protect your systems and data from potential hackers.